Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary

Authors

  • Donald R. Reising The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA
  • Joshua H. Tyler The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA
  • Mohamed K. M. Fadul The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA
  • Matthew R. Hilling The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA
  • T. Daniel Loveless Indiana University, Bloomington, IN 47405 USA

DOI:

https://doi.org/10.13052/jcsm2245-1439.1354

Keywords:

Specific emitter identification (SEI), ID verification, security, SEI mimicry, Adversary, RF fingerprint

Abstract

Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.

Downloads

Download data is not yet available.

Author Biographies

Donald R. Reising, The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA

Donald R. Reising received a B.S. degree in electrical engineering from the University of Cincinnati, Cincinnati, OH, in 2006 and an M.S. and Ph.D. in electrical engineering from the Air Force Institute of Technology, Dayton, OH, in 2009 and 2012, respectively. From 2008 to 2014, he was an electronics engineer with the U.S. Air Force Research Laboratory at Wright-Patterson Air Force Base, Dayton, OH. He is an Alexander and Charlotte Guerry and University of Chattanooga (UC) Foundation Associate Professor of Electrical Engineering with the University of Tennessee at Chattanooga, Chattanooga, TN, USA. His research interests include wireless device discrimination using RF distinct native attribute fingerprints, deep learning, next-generation communications systems, dynamic spectrum access, and critical infrastructure protection. He is a senior member of the Institute of Electrical and Electronics Engineers (IEEE) and a member of Eta Kappa Nu and Tau Beta Pi.

Joshua H. Tyler, The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA

Joshua H. Tyler is a doctoral student and researcher at the University of Tennessee at Chattanooga. His research interests include specific emitter identification, power quality analysis, digital communications, deep learning, and edge computing. He graduated Bachelor of Science in Electrical Engineering from the University of Tennessee at Chattanooga in 2020, with a Master of Science in Electrical Engineering in 2022. He is currently employed as a research associate in the Electrical Engineering department at UTC. He is a student member of the Institute of Electrical and Electronics Engineers (IEEE).

Mohamed K. M. Fadul, The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA

Mohamed K. M. Fadul received a B.S. degree in electrical and electronics engineering from the University of Khartoum, Khartoum, Sudan, in 2012 and the M.S. and Ph.D. degrees in electrical engineering and computational engineering from The University of Tennessee at Chattanooga, Chattanooga, TN, USA, in 2018 and 2022, respectively. He is a postdoctoral researcher at The University of Tennessee at Chattanooga, Chattanooga, TN, USA. His research interests include software-defined radios, wireless device discrimination using RF distinct native attribute fingerprints, and deep learning.

Matthew R. Hilling, The University of Tennessee at Chattanooga, Chattanooga, TN 37403 USA

Matthew R. Hilling received a B.S. in electrical engineering from The University of Tennessee at Chattanooga, Chattanooga, TN, USA, in 2021 and was a graduate research assistant within Dr. Reising’s Wireless Sensing Group (WSG) during the 2021–2022 academic year.

T. Daniel Loveless, Indiana University, Bloomington, IN 47405 USA

T. Daniel Loveless is an Associate Professor of Intelligent Systems Engineering at Indiana University. They received a B.S. degree in electrical engineering from Georgia Institute of Technology, Atlanta, Georgia, in 2004 and M.S. and Ph.D. in electrical engineering from Vanderbilt University, Nashville, Tennessee, in 2007 and 2009, respectively. Dr. Loveless was a Guerry Professor of Electrical Engineering at the University of Tennessee at Chattanooga from 2014 to 2023. Before joining UTC in 2014, Dr. Loveless was a senior engineer and Research Assistant Professor at the Institute for Space and Defense Electronics (ISDE) at Vanderbilt University. Their research interests include radiation effects and reliability in electronic and photonic integrated circuits; high-performance and radiation-hardened digital, mixed-signal, and analog integrated circuit design; embedded systems; field-programmable gate arrays (FPGAs); microprocessors and microcontrollers; systems-on-chip; and CubeSat design. Dr. Loveless has published over 110 articles in peer-reviewed journals, is a Senior Member of IEEE, and is an Associate Editor of the IEEE Transactions on Nuclear Science. Dr. Loveless’ honors include the inaugural 2019 Nuclear and Plasma Sciences Society (NPSS) Radiation Effects Early Achievement Award, five best conference paper awards, and the Institute of Electrical and Electronics Engineers (IEEE) NPSS Graduate Scholarship Award for recognition of contributions to the fields of nuclear and plasma sciences. He is a member of the American Society for Engineering Education (ASEE) and a senior member of IEEE.

References

Martin Bastiaans and Marc Geilen. On the discrete gabor transform and the discrete zak transform. Signal processing, 49(3), 1996.

William E Cobb, Eric D Laspe, Rusty O Baldwin, Michael A Temple, and Yong C Kim. Intrinsic physical-layer authentication of integrated circuits. IEEE Transactions on Information Forensics and Security, 7(1):14–24, 2011.

Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security, pages 89–98, 2010.

Ettus Research. USRP Hardware Driver and USRP Manual. https://www.ettus.com/all-products/ub210-kit/, May 26, 2020.

Mohamed KM Fadul, Donald R Reising, and Mina Sartipi. Identification of ofdm-based radios under rayleigh fading using rf-dna and deep learning. IEEE Access, 9:17100–17113, 2021.

Mohamed KM Fadul, Jordan T Willis, Donald R Reising, and T Daniel Loveless. An analysis of process parameters for the optimization of specific emitter identification under rayleigh fading. In Global IoT Summit, pages 277–291. Springer, 2022.

Steven Frank. This AI can Spot an Art Forgery: With millions at stake, deep learning enters the art world. IEE Spectrum, Aug 2021.

Dennis Gabor. Theory of communication. part 1: The analysis of information. Journal of the Institution of Electrical Engineers-part III: radio and communication engineering, 93(26):429–441, 1946.

Rafael C Gonzalez, Steven L Eddins, Richard Eugene Woods, et al. Digital image processing using MATLAB. Upper Saddle River, NJ: Pearson/Prentice Hall,, 2004.

Great Scott Gadgets. HackRF One. https:/greatscottgadgets.com/hackrf/one/, May 26, 2020.

Hao Han, Li Cui, Wen Li, Luying Huang, Yuan Cai, Jihao Cai, and Yuli Zhang. Radio frequency fingerprint based wireless transmitter identification against malicious attacker: An adversarial learning approach. In 2020 International Conference on Wireless Communications and Signal Processing (WCSP), pages 310–315. IEEE, 2020.

IEEE. IEEE Std 802.11-2007, Local and Metropolitan Area Networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Jun 2007.

Hossein Jafari, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu, and Lijun Qian. Iot devices fingerprinting using deep learning. In Military Communications Conference (MILCOM), pages 1–9. IEEE, 2018.

Samurdhi Karunaratne, Enes Krijestorac, and Danijela Cabric. Penetrating rf fingerprinting-based authentication with a generative adversarial attack. In International Conference on Communications (ICC), pages 1–6. IEEE, 2021.

Igor Kononenko. Estimating attributes: Analysis and extensions of relief. In European conference on machine learning, pages 171–182. Springer, 1994.

Lawrence E Langley. Specific emitter identification (sei) and classical parameter fusion technology. In Proceedings of WESCON’93, pages 377–381. IEEE, 1993.

Guyue Li, Jiabao Yu, Yuexiu Xing, and Aiqun Hu. Location-invariant physical layer identification approach for wifi devices. Ieee Access, 7:106974–106986, 2019.

Gihan Janith Mendis, Jin Wei-Kocsis, and Arjuna Madanayake. Deep learning based radio-signal identification with hardware design. IEEE Transactions on Aerospace and Electronic Systems, 55(5):2516–2531, 2019.

Yiwei Pan, Sihan Yang, Hua Peng, Tianyun Li, and Wenya Wang. Specific emitter identification based on deep residual networks. IEEE Access, 7:54425–54434, 2019.

Donald Reising, Joseph Cancelleri, T Daniel Loveless, Farah Kandah, and Anthony Skjellum. Radio identity verification-based iot security using rf-dna fingerprints and svm. IEEE Internet of Things Journal, 8(10):8356–8371, 2020.

Donald R Reising, Michael A Temple, and Julie A Jackson. Authorized and rogue device discrimination using dimensionally reduced rf-dna fingerprints. IEEE Transactions on Information Forensics and Security, 10(6):1180–1192, 2015.

Donald R Reising, Joshua H Tyler, Mohamed KM Fadul, Matthew R Hilling, and T Daniel Loveless. Rf fingerprint-based identity verification in the presence of an sei mimicking adversary. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pages 438–444. IEEE, 2023.

Francesco Restuccia, Salvatore D’Oro, Amani Al-Shawabka, Mauro Belgiovine, Luca Angioloni, Stratis Ioannidis, Kaushik Chowdhury, and Tommaso Melodia. Deepradioid: Real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms. In Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 51–60, 2019.

Francesco Restuccia, Salvatore D’Oro, Amani Al-Shawabka, Bruno Costa Rendon, Kaushik Chowdhury, Stratis Ioannidis, and Tommaso Melodia. Hacking the waveform: Generalized wireless adversarial deep learning. arXiv preprint arXiv:2005.02270, 2020.

Kejin Sa, Dapeng Lang, Chenggang Wang, and Yu Bai. Specific emitter identification techniques for the internet of things. IEEE Access, 8:1644–1652, 2019.

Yi Shi, Kemal Davaslioglu, and Yalin E Sagduyu. Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing. IEEE Transactions on Cognitive Communications and Networking, 7(1):294–303, 2020.

Bernard Sklar. Digital communications: fundamentals and applications. Pearson, 2021.

Mohamed A Taha, Mohamed KM Fadul, Joshua H Tyler, Donald R Reising, and T Daniel Loveless. An assessment of entropy-based data reduction for sei within iot applications. In Military Communications Conference (MILCOM), pages 385–392. IEEE, 2022.

Joshua H Tyler, Mohamed KM Fadul, Donald R Reising, and Erkan Kaplanoglu. Simplified denoising for robust specific emitter identification of preamble-based waveforms. In 2021 IEEE Global Communications Conference (GLOBECOM), pages 1–7. IEEE, 2021.

Joshua H Tyler, Mohamed MK Fadul, Donald R Reising, and Farah I Kandah. An analysis of signal energy impacts and threats to deep learning based sei. In ICC 2022-IEEE International Conference on Communications, pages 2077–2083. IEEE, 2022.

WiSilica. Top 6 IoT Communication Protocols. https:/wisilica.com/company/top-6-iot-communication-protocols/, Aug. 2020.

Qiang Xu, Rong Zheng, Walid Saad, and Zhu Han. Device fingerprinting in wireless networks: Challenges and opportunities. IEEE Communications Surveys & Tutorials, 18(1):94–104, 2015.

Downloads

Published

2024-09-03

How to Cite

1.
Reising DR, Tyler JH, Fadul MKM, Hilling MR, Loveless TD. Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary. JCSANDM [Internet]. 2024 Sep. 3 [cited 2024 Sep. 12];13(05):887-916. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24113

Issue

Section

Articles